Intro CTF

Insight into Capture the Flag As we hear in the news, cyber-attacks are constant and ever changing. Understanding how cyber-attacks work is now a necessary skill. As a starting point, OWASP.org compiles a list of the 10 most common exploit categories. Some of these categories, like SQL Injections, have been around for decades but are still VERY common.

In this event, you will have written step-by-step instructions to walk you through some common exploits per the OWASP Top 10. A basic familiarity with command line use is helpful but not required. We will have staff available to answer questions as needed too. All you need is a laptop with a browser. Firefox seems to work best.

Requirements This interactive training range gives you a chance to practice and learn basic recon and exploitation tools and tactics in a virtual environment. To participate: you must have your own Wi-Fi-enabled laptop with preferred browsers Chrome and Firefox (will work with some versions of IE, will not work with Safari). Experience with Kali Linux helpful, but not required. * WiFi will be available at BSidesSATX Bring your prepared laptop or device with your own toolset

ABOUT DELTA RISK LLC Delta Risk LLC provides tailored, high-impact cyber security and risk management services to government and private sector clients worldwide. Formed in 2007, Delta Risk consists of trusted professionals with expert knowledge around technical security, policy and governance, and infrastructure protection to help clients improve their cyber security operational capability and protect business operations. Delta Risk is a Chertoff Group company. For more information, visit https://www.delta-risk.net.